Search criteria

6 vulnerabilities found for nuxeo by nuxeo

FKIE_CVE-2013-4521

Vulnerability from fkie_nvd - Published: 2020-02-06 16:15 - Updated: 2024-11-21 01:55
Severity ?
Summary
RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165.
Impacted products
Vendor Product Version
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.6.0
nuxeo nuxeo 5.8.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "42899695-FAB5-4F81-86BE-89E3089CBB36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix01:*:*:*:*:*:*",
              "matchCriteriaId": "43160374-78C9-41E4-9884-C78ECD42B6AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix02:*:*:*:*:*:*",
              "matchCriteriaId": "03A3A542-E589-441A-8A8D-B997C9E028F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix03:*:*:*:*:*:*",
              "matchCriteriaId": "E4D3B6C0-EEA6-4BAE-9992-8C439204D03D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix04:*:*:*:*:*:*",
              "matchCriteriaId": "2DB7EFE4-DC2D-4DA9-B194-848E2DE3A16C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix05:*:*:*:*:*:*",
              "matchCriteriaId": "C4AD54AC-9115-4782-8CA1-F278C79A3C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix06:*:*:*:*:*:*",
              "matchCriteriaId": "DA1D0325-34F3-436D-A527-BFDC884E3C8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix07:*:*:*:*:*:*",
              "matchCriteriaId": "C6C63873-5E2A-4FFD-9681-F2D6BE281237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix08:*:*:*:*:*:*",
              "matchCriteriaId": "BBB4C6A4-E296-4697-BBAE-A862DFAF6665",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix09:*:*:*:*:*:*",
              "matchCriteriaId": "71877702-48D7-4EE8-9A7C-C9CEDD63C4A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix10:*:*:*:*:*:*",
              "matchCriteriaId": "DCAFE86A-E0A6-44CF-8692-BE75EDDF3700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix11:*:*:*:*:*:*",
              "matchCriteriaId": "74CA7501-3BC6-4227-A865-5D7B378D590A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix12:*:*:*:*:*:*",
              "matchCriteriaId": "726CB6C8-73BF-46D7-806E-731325D70A95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix13:*:*:*:*:*:*",
              "matchCriteriaId": "DF2D5F08-5993-4900-A543-9ADE64E16755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix14:*:*:*:*:*:*",
              "matchCriteriaId": "2B8F70D1-ED38-4689-8DA9-110972170438",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix15:*:*:*:*:*:*",
              "matchCriteriaId": "B86C501E-D555-4CAF-AC09-40A35855C218",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix16:*:*:*:*:*:*",
              "matchCriteriaId": "F6978E83-F831-4EB9-B3EF-A05FF733E596",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix17:*:*:*:*:*:*",
              "matchCriteriaId": "22F818F2-EBFE-48BB-AE44-1F865EE1AC51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix18:*:*:*:*:*:*",
              "matchCriteriaId": "D5C523C0-E03D-4E97-AAD8-86E387D95296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix19:*:*:*:*:*:*",
              "matchCriteriaId": "1315D200-164D-4FB6-A46F-6F70AD7C8234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix20:*:*:*:*:*:*",
              "matchCriteriaId": "2B83B5A9-42B7-4B1C-9B58-0298B69B5568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix21:*:*:*:*:*:*",
              "matchCriteriaId": "07030217-791D-4EE2-AD44-B0147B88CCA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix22:*:*:*:*:*:*",
              "matchCriteriaId": "9CCEFC5B-EF57-4FBC-AC4C-CBA29103A8AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix23:*:*:*:*:*:*",
              "matchCriteriaId": "6E14078D-A0B5-4FC5-B713-A06FE53B38AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix24:*:*:*:*:*:*",
              "matchCriteriaId": "C4BE4C3E-FC4C-4A78-A9C1-0FB4D597CA4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix25:*:*:*:*:*:*",
              "matchCriteriaId": "FE2ED381-5DF4-4905-9564-7C897F7DD3A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.6.0:hotfix26:*:*:*:*:*:*",
              "matchCriteriaId": "8281BE24-66D7-4F72-B656-6795F6A50AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:5.8.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "AE2E0C2C-0CE4-45F6-A2A4-85D4F21792FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n de RichFaces en Nuxeo Platform versi\u00f3n 5.6.0 anterior a HF27 y versi\u00f3n 5.8.0 anterior a HF-01, no restringe las clases para las que los m\u00e9todos de deserializaci\u00f3n pueden ser llamados, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de datos serializados dise\u00f1ados. NOTA: esta vulnerabilidad puede solaparse con CVE-2013-2165."
    }
  ],
  "id": "CVE-2013-4521",
  "lastModified": "2024-11-21T01:55:43.977",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-02-06T16:15:11.087",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027052"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027052"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-502"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2017-5869

Vulnerability from fkie_nvd - Published: 2017-03-24 14:59 - Updated: 2025-04-20 01:37

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF32E088-DFA2-49F0-89E5-B211267B3220",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EDDB7ED-4D9F-43A8-8078-21D3B1A70F55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7283BDD-196B-43EA-BB48-4E3281729C9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nuxeo:nuxeo:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "25647016-45D5-434F-BDD0-8F3D0E44A840",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in the file import feature in Nuxeo Platform 6.0, 7.1, 7.2, and 7.3 allows remote authenticated users to upload and execute arbitrary JSP code via a .. (dot dot) in the X-File-Name header."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en la caracter\u00edstica de importaci\u00f3n de archivo en Nuxeo Platform 6.0, 7.1, 7.2 y 7.3 permite a usuarios remotos autenticados cargar y ejecutar c\u00f3digo JSP arbitrario a trav\u00e9s de un .. (dot dot) en la cabecera X-File-Name."
    }
  ],
  "id": "CVE-2017-5869",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-24T14:59:00.303",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2017/03/23/6"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/97083"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/41748/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2017/03/23/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/97083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/41748/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2013-4521 (GCVE-0-2013-4521)

Vulnerability from cvelistv5 – Published: 2020-02-06 15:43 – Updated: 2024-08-06 16:45
VLAI?
Summary
RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165.
Severity ?
No CVSS data available.
CWE
  • Other
Assigner
Impacted products
Vendor Product Version
Nuxeo Nuxeo Platform Affected: 5.6.0 before HF27
Affected: 5.8.0 before HF-01
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.866Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027052"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Nuxeo Platform",
          "vendor": "Nuxeo",
          "versions": [
            {
              "status": "affected",
              "version": "5.6.0 before HF27"
            },
            {
              "status": "affected",
              "version": "5.8.0 before HF-01"
            }
          ]
        }
      ],
      "datePublic": "2013-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Other",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-06T15:43:41",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027052"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4521",
    "datePublished": "2020-02-06T15:43:41",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.866Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-5869 (GCVE-0-2017-5869)

Vulnerability from cvelistv5 – Published: 2017-03-24 14:00 – Updated: 2024-08-05 15:11
VLAI?
Summary
Directory traversal vulnerability in the file import feature in Nuxeo Platform 6.0, 7.1, 7.2, and 7.3 allows remote authenticated users to upload and execute arbitrary JSP code via a .. (dot dot) in the X-File-Name header.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:11:48.932Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/"
          },
          {
            "name": "[oss-security] 20170323 [CVE-2017-5869] Nuxeo Platform remote code execution",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2017/03/23/6"
          },
          {
            "name": "41748",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41748/"
          },
          {
            "name": "97083",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/97083"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-03-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the file import feature in Nuxeo Platform 6.0, 7.1, 7.2, and 7.3 allows remote authenticated users to upload and execute arbitrary JSP code via a .. (dot dot) in the X-File-Name header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-15T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/"
        },
        {
          "name": "[oss-security] 20170323 [CVE-2017-5869] Nuxeo Platform remote code execution",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2017/03/23/6"
        },
        {
          "name": "41748",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41748/"
        },
        {
          "name": "97083",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/97083"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-5869",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the file import feature in Nuxeo Platform 6.0, 7.1, 7.2, and 7.3 allows remote authenticated users to upload and execute arbitrary JSP code via a .. (dot dot) in the X-File-Name header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/",
              "refsource": "MISC",
              "url": "https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/"
            },
            {
              "name": "[oss-security] 20170323 [CVE-2017-5869] Nuxeo Platform remote code execution",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2017/03/23/6"
            },
            {
              "name": "41748",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41748/"
            },
            {
              "name": "97083",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/97083"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-5869",
    "datePublished": "2017-03-24T14:00:00",
    "dateReserved": "2017-02-02T00:00:00",
    "dateUpdated": "2024-08-05T15:11:48.932Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4521 (GCVE-0-2013-4521)

Vulnerability from nvd – Published: 2020-02-06 15:43 – Updated: 2024-08-06 16:45
VLAI?
Summary
RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165.
Severity ?
No CVSS data available.
CWE
  • Other
Assigner
Impacted products
Vendor Product Version
Nuxeo Nuxeo Platform Affected: 5.6.0 before HF27
Affected: 5.8.0 before HF-01
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:45:14.866Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027052"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Nuxeo Platform",
          "vendor": "Nuxeo",
          "versions": [
            {
              "status": "affected",
              "version": "5.6.0 before HF27"
            },
            {
              "status": "affected",
              "version": "5.8.0 before HF-01"
            }
          ]
        }
      ],
      "datePublic": "2013-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "RichFaces implementation in Nuxeo Platform 5.6.0 before HF27 and 5.8.0 before HF-01 does not restrict the classes for which deserialization methods can be called, which allows remote attackers to execute arbitrary code via crafted serialized data. NOTE: this vulnerability may overlap CVE-2013-2165."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Other",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-06T15:43:41",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027052"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://doc.nuxeo.com/display/public/ADMINDOC58/Nuxeo+Security+Hotfixes"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/nuxeo/richfaces/commit/6cbad2a6dcb70d3e33a6ce5879b1a3ad79eb1aec"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4521",
    "datePublished": "2020-02-06T15:43:41",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:45:14.866Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-5869 (GCVE-0-2017-5869)

Vulnerability from nvd – Published: 2017-03-24 14:00 – Updated: 2024-08-05 15:11
VLAI?
Summary
Directory traversal vulnerability in the file import feature in Nuxeo Platform 6.0, 7.1, 7.2, and 7.3 allows remote authenticated users to upload and execute arbitrary JSP code via a .. (dot dot) in the X-File-Name header.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:11:48.932Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/"
          },
          {
            "name": "[oss-security] 20170323 [CVE-2017-5869] Nuxeo Platform remote code execution",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2017/03/23/6"
          },
          {
            "name": "41748",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41748/"
          },
          {
            "name": "97083",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/97083"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-03-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in the file import feature in Nuxeo Platform 6.0, 7.1, 7.2, and 7.3 allows remote authenticated users to upload and execute arbitrary JSP code via a .. (dot dot) in the X-File-Name header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-15T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/"
        },
        {
          "name": "[oss-security] 20170323 [CVE-2017-5869] Nuxeo Platform remote code execution",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2017/03/23/6"
        },
        {
          "name": "41748",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41748/"
        },
        {
          "name": "97083",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/97083"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-5869",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in the file import feature in Nuxeo Platform 6.0, 7.1, 7.2, and 7.3 allows remote authenticated users to upload and execute arbitrary JSP code via a .. (dot dot) in the X-File-Name header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/",
              "refsource": "MISC",
              "url": "https://sysdream.com/news/lab/2017-03-23-cve-2017-5869-nuxeo-platform-remote-code-execution/"
            },
            {
              "name": "[oss-security] 20170323 [CVE-2017-5869] Nuxeo Platform remote code execution",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2017/03/23/6"
            },
            {
              "name": "41748",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41748/"
            },
            {
              "name": "97083",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/97083"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-5869",
    "datePublished": "2017-03-24T14:00:00",
    "dateReserved": "2017-02-02T00:00:00",
    "dateUpdated": "2024-08-05T15:11:48.932Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}